Skip to main content

Julian Knight

Julian Knight's Public Library

Aug 02, 15

via gHacks Technology News http://www.ghacks.net

This Windows 10 privacy guide is a work in progress. We will add new information and make adjustments once they become available. When it comes to Windows 10 and privacy, there are lots of things tha…

Jun 14, 15

via gHacks Technology News http://www.ghacks.net

Sometimes, you may want to listen to audio on other devices than the one the audio is actually playing on. Maybe you want to listen to audio while you are in another room, for instance on your Xbox o…

Jun 08, 15

via gHacks Technology News http://www.ghacks.net

As a Windows user, it is always good to be extra cautious when it comes to running programs on Windows PCs as a single-click may cause all kinds of troubles. While malware may be the most common atta…

May 09, 15

via gHacks Technology News http://www.ghacks.net

The first Firefox build of uMatrix has been created by Gorhill on Github. The release is dubbed a "very early preview" and users are asked not to file feature requests currently. The Firefox version …

Mar 26, 15

via Regular Geek http://regulargeek.com Today we have a few top stories for you. First, Apple announced their acquisition of FoundationDB. I am curious what this purchase is really about, but we will have to wait and see. Both Sides of the Table bri…

Mar 26, 15

via Ars Technica http://arstechnica.com A visual travelog of the Ars San Ramon-Schenectady Internet of Things Express Tour.

Mar 12, 15

via Techdirt. https://www.techdirt.com/ Until recently, most people probably assumed that real net neutrality was more likely to come to Europe than to the US. But in one of those ironic little twists, not only has the FCC voted in favor of net neut…

Mar 06, 15

via gHacks Technology News http://www.ghacks.net

If you are on Facebook or on Google+ and have at least one friend or contact on the site, chance is that you receive birthday notifications. Birthday notifications are enabled on both systems by defa…

Feb 22, 15

via Gizmag Emerging Technology Magazine http://www.gizmag.com/

When you get a shiny new desktop, Ultrabook, or 2-in-1 convertible Windows computer, you'll be tempted to dive right in and get to work or play. However, it's best to take a deep breath…

Jan 23, 15

via Techdirt. https://www.techdirt.com/

The state of New York wants to get in on all the cybersecurity fun the kids legislators and intelligence officials are talking about these days. New York Attorney General Eric T. Schneiderman has announced ...

Jan 15, 15

via Techdirt. https://www.techdirt.com/

The greatest threat to law enforcement since the motocar continues to receive attention from entities aghast at the notion that peoples' communications and data might not be instantly accessible by law enfo...

Jan 08, 15

via ArsFull http://pipes.yahoo.com/pipes/pipe.info?_id=d885e00cadf41a63bcd181fd8171ca7b

http://darkmail.info/

Ladar Levison is probably most well-known to Ars readers as the founder of the secure e-mail service Lavabit, which he shut down in mid...

Dec 27, 14

via Opensource.com http://opensource.com/frontpage
Healthcare is one of the most urgent socioeconomic issues of our time. This year, Opensource.com saw a variety of news and feature stories about applying the open source way and open source softw...

Dec 19, 14

via ArsFull http://pipes.yahoo.com/pipes/pipe.info?_id=d885e00cadf41a63bcd181fd8171ca7b

Gettysburg College

The traditional picture of Vikings is one of boatloads of hairy men pillaging their way along the coasts of Europe. Though true to some de...

Dec 12, 14

via Techdirt. https://www.techdirt.com/

One of the knock-on effects of Snowden's leaks is that the NSA is terrified there might be more whistleblowers, and has taken extreme action in an attempt to reduce the risk of that happening by stripping 1...

Dec 09, 14

via ArsFull http://pipes.yahoo.com/pipes/pipe.info?_id=d885e00cadf41a63bcd181fd8171ca7b

Wikipedia

Researchers have uncovered an extremely stealthy trojan for Linux systems that attackers have been using to siphon sensitive data from governments ...

Dec 07, 14

via Regular Geek http://regulargeek.com I have talked about human filters and my plan for digital curation. These items are the fruits of those ideas, the items I deemed worthy from my daily reading. These items are a combination of tech business ...

Nov 03, 14

via Ars Technica http://arstechnica.com Carrier was social-engineered by hacker to steal man’s two-letter Instagram name.

Oct 26, 14

via gHacks Technology News http://www.ghacks.net

You are here: Home > Software > VoodooShield protects your PC by only allowing whitelisted programs to run

By Martin Brinkmann on October 18, 2014 in Software - Last Update: October 18, 2014

Wind...

1 - 20 of 1745 Next › Last »
20 items/page

Highlighter, Sticky notes, Tagging, Groups and Network: integrated suite dramatically boosting research productivity. Learn more »

Join Diigo